The ASIS 7th Middle East Security Conference & Exhibition provides an established platform for education and business exchange, addressing the key trends and issues facing security professionals in the region. In addition to the dedicated oil and gas track, the event draws a global attendance actively involved in key sectors of economic diversification such as civil infrastructure, aviation, rail and port infrastructure, financial centers, tourism, education, etc. With the Economist forecasting GCC wide growth in GDP of 4–5% over the period to 2018, ASIS has designed this event to help security professionals facilitate business growth whilst navigating the region’s specific security challenges.
Talk presented by MWR
- Time: 15:00:00
- Room: TBC
- Topic: Contactless Card Hacking
- Speakers: Ben Downton
- Description: In the UAE, contactless technology is everywhere. They let us into our homes and hotel rooms, take public transport, purchase drinks, go skiing, and even provide swift access through immigration. The risk of cards being cloned or modified could be serious, particularly as there could be no physical trace of an attack.
This presentation will walk through some of the security features of the different types of contactless technology: - An overview of contactless card technologies - Discussion of security features (and weaknesses) - Case studies of real-world hacks - Live demonstration of contactless card hacking - Best practice approach to using contactless technology.
Business Impacts of this Session:
- The presentation will give an insight into the practical attacks against different technologies, including details on the equipment, knowledge requirements, and methods of attack.
- For those involved in providing these cards, they are often trusted as 'secure'. The presentation will make you question how contactless cards are used within your own organisation, and whether they should be trusted.
- New developments in the UAE often mean new technology, but if this isn't well understood (or worse, blindly assumed to be secure), it can introduce serious risks to the environment. Moreover, fixing these mistakes after equipment has been installed can be very costly.